Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6321
The future of healthcare using multimodal AI: Technology that can read, see, hear and sense
Published 2024-06-01“…However, ethical and security concerns accompany the use of extensive patient data. …”
Get full text
Article -
6322
Facial Recognition Databases: Recent Developments and Review of Methods
Published 2023-12-01“… Facial recognition is one of the most important biometrics that many researchers are increasingly studying, as it is used in various applications such as surveillance, security, law enforcement, information, person identification, smart cards, access control, etc. …”
Get full text
Article -
6323
FinTech: a literature review of emerging financial technologies and applications
Published 2025-01-01“…Within the financial milieu, there is an ongoing pursuit for more precise, optimized, secure, and agile solutions capable of managing multifarious financial undertakings. …”
Get full text
Article -
6324
Human-induced water loss potentially threatens sustainable development of sandy regions in China
Published 2025-01-01“…This depletion potentially threatens both regional sustainability and national ecological security. This study calls for urgent scientific regulations on water resources, including strict control of local consumption and enhancement of supply capacity.…”
Get full text
Article -
6325
Services selection based on trust evolution and union for cloud computing
Published 2011-01-01“…It was difficult for the service consumers to obtain high-quality composite services because of the existence of false or malicious service nodes in cloud computing environment.A novel cloud service-composition method based on the trust span tree was proposed.The trust relationship could be built after many times credible interaction between ser-vices requester and provider,and the trust union would be formed through the credible relationship evolution.So that the uncertain or malicious service should be excluded from the trust span tree,and the service composition would be carried out in a trust environment.At the same time,the measuring strategy of trust relationship among cloud services based on information entropy was designed,which could resolve the deficiencies of the trust parameter analysed by simply weighted angle in the previous studies.The experimental result shows that the method proposed in this paper is more su-perior in credibility and security,comparing to the traditional services selection methods.…”
Get full text
Article -
6326
Identification of Landslide Hazard in Residential Area Kubang Tangah District, Sawahlunto
Published 2024-06-01“…With rapid residential growth and environmental change, risks to the security and well-being of residents are becoming increasingly prominent. …”
Get full text
Article -
6327
Credible distributed identity authentication system of microgrid based on blockchain
Published 2021-12-01“…Most of the blockchain-based identity authentication systems are based on public blockchain, which are still essentially traditional centralized identity management and verification methods, making it difficult to meet the needs of trusted access and fine-grained access control in microgrids.Therefore, based on the FISCO BCOS consortium blockchain technology, a distributed identity authentication system supporting multi-center was designed.A DID-based identity management protocol to achieve autonomous control of user identity in a practical scenarios was designed.Distributed trusted access technology for end nodes in microgrids was studied, and privacy-protecting credentials based on zero-knowledge proof were designed.This scheme meets the requirements of trustworthy and verifiable user identity in different privacy security scenarios, and achieves autonomous control of entity identity, fine-grained access control and trusted data exchange.The usability and effectiveness of the proposed algorithm are demonstrated through system experiments and performance analysis.…”
Get full text
Article -
6328
Living the liquid life: Gender, precarity, and journalism in the post-#metoo era
Published 2024-09-01“…Increasing demands for flexibility have institutionalised temporary contracts, eroded job security, and expanded job precarity, with women and young journalists disproportionately affected. …”
Get full text
Article -
6329
A Critical Assessment of the Marugoto: The Language and Culture of Japan Series of Course-books
Published 2020-10-01“…The results suggested that while having their strengths and advantages, the books suffer from a few shortcomings, which can be eliminated in future editions to achieve better results and to secure a spot as a relatively new textbook for teaching the Japanese language. …”
Get full text
Article -
6330
Geographical Information Systems in International Relations: Ferghana Valley Case
Published 2024-12-01“…The debate surrounding whether the Fergana Valley presents a security challenge in Central Asia will be explored. …”
Get full text
Article -
6331
Green actions for innovative cities. The new agri-food landscape
Published 2022-06-01“…Specifically, urban agriculture and community gardens play an important role, helping to secure various socio-ecological benefits on a local basis and to promote access to healthy, Zero Km sources. …”
Get full text
Article -
6332
SwinInsSeg: An Improved SOLOv2 Model Using the Swin Transformer and a Multi-Kernel Attention Module for Ship Instance Segmentation
Published 2025-01-01“…Maritime surveillance is essential for ensuring security in the complex marine environment. The study presents SwinInsSeg, an instance segmentation model that combines the Swin transformer and a lightweight MKA module to segment ships accurately and efficiently in maritime surveillance. …”
Get full text
Article -
6333
Network function heterogeneous redundancy deployment method based on immune algorithm
Published 2021-02-01“…Aiming at the problem that the existing security defense methods cannot resist many unknown vulnerabilities and backdoors in the network function virtualization platform, a mimic defense architecture for network function virtualization using mimic defense ideas was proposed, a heterogeneous redundant deployment method based on an immune algorithm for the construction of heterogeneous pools was proposed.Firstly, the degree of heterogeneity between heterogeneous entities was quantitatively evaluated in combination with the entropy value method, then the network function heterogeneous redundant deployment problem was constructed into a minimax problem with the optimization goal of maximizing the degree of heterogeneity between heterogeneous entities, and finally the immune algorithm was used to quickly solve the optimal deployment solution of network functions.Simulation results show that the proposed method can quickly converge to an optimal deployment scheme and ensure that the overall distribution of heterogeneity between heterogeneous bodies is at a high level, effectively increasing the diversity between heterogeneous bodies and improving the attacker's difficulty.…”
Get full text
Article -
6334
Satellite remote sensing and the integration of 6G communication and remote sensing
Published 2023-04-01“…Satellite remote sensing is an important means for humans to achieve high-resolution earth observation, and it has gradually become an important component supporting economic and social development as well as national defense and security.6G pursues deep integration of communication, perception, and computation, and communication and remote sensing integration has become an important feature of it.The development of satellite remote sensing at home and abroad were reviewed, the existing system architecture of satellite remote sensing systems and the integrated system architecture of communication and remote sensing in the 6G era were outlined, and the typical satellite remote sensing technologies and the latest research progress driven by artificial intelligence were elaborated on.In response to the trend of integrating satellite communication and remote sensing in the 6G era, the technical challenges and development trends of realizing the combination of “one satellite, multiple uses, multi-satellite networking, multi-network integration, and intelligent services” were discussed.…”
Get full text
Article -
6335
Spanish refugees in Portugal and the Portuguese solidarity (1936-1945)
Published 2024-12-01“…Due to its authoritarian nature, Salazar´s regime proved reluctant to receive them and developed a repression directed at these refugees, considered “undesirable,” visible in the increase of the number of border posts and their reinforcement and in the collaboration between different authorities, namely PVDE (State Surveillance and Defense Police), GNR (Republican National Guard), PSP (Public Security Police) and GF (Fiscal Guard), leading to their concentration in large national prisons. …”
Get full text
Article -
6336
Barriers and Enablers of AI Adoption in Human Resource Management: A Critical Analysis of Organizational and Technological Factors
Published 2025-01-01“…Change aversion, data security worries, and integration expenses are major roadblocks, but strong digital leadership, company culture, and advancements in NLP and machine learning are key enablers. …”
Get full text
Article -
6337
Toward Safer E-Commerce Transactions: The Influence of System Quality, Information Accuracy, and Government Oversight
Published 2024-12-01“…To improve public knowledge about transaction security in e-commerce, thorough socialization and education are needed, targeting all parties involved in online transactions, including marketplaces, payment providers, and delivery services. …”
Get full text
Article -
6338
Extensive Surgical Emphysema in a Child after Primary Closure of Tracheocutaneous Fistula
Published 2020-01-01“…We gave him oxygen supplementation, removed surgical stitch, and inserted a 4 mm tracheostomy tube to secure airway. Chest X-ray ruled out pneumothorax or pneumomediastinum. …”
Get full text
Article -
6339
A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features
Published 2015-01-01“…Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. …”
Get full text
Article -
6340
Leaking Network Devices with Rubber Ducky Attack
Published 2024-12-01“…By placing the module in a device connected to the target network, a network scan was performed to determine the security status, IP addresses, port information, and version information of all devices. …”
Get full text
Article